-- Florian Weimer / Red Hat Product Security Team
More than a decade ago, there was some work in GCC and glibc about
propagating bounds information for pointers. I could find the old web
page on archive.org, but I'm wondering if there's a concise report how
it actually worked and how much software could be ported over with what
amount of effort.
- Report on the bounded pointers work Florian Weimer
- Re: Report on the bounded pointers work Ondřej Bílka
- Re: Report on the bounded pointers work Jeff Law
- Re: Report on the bounded pointers work Joseph S. Myers
- Re: Report on the bounded pointers work Florian Weimer
- Re: Report on the bounded pointers work Jeff Law
- Re: Report on the bounded pointers ... Ondřej Bílka
- Re: Report on the bounded pointers work Yury Gribov
- Re: Report on the bounded pointers work Jeff Law
- Re: Report on the bounded pointers work Jakub Jelinek
- Re: Report on the bounded pointers work Frank Ch. Eigler